SQL Injection is perhaps the most common web-application hacking technique which attempts to pass SQL commands through a web application for execution by the back-end database. The vulnerability is presented when user input is incorrectly sanitized and thereby executed.

Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors.

There are many reasons why you wouldn't want your operating system connect to Microsoft's server, be it for practical reasons or pure idealism. Based on the source-code of the award-winning xpy (version 0.9.8), Vispa allows you to easily tweak your Windows Vista for better privacy and security, even system performance. Do a few clicks rather than finding the write registry keys or program settings.

MsManhattan writes "High Tech Computer Corp. (HTC) has unveiled a touch-screen mobile device that offers many of the same features as the iPhone but with an emphasis on business applications vs. entertainment value. The HTC Touch is based on Microsoft's Windows Mobile 6 Professional OS and features a 2.8-inch touch screen offering access to emails, contacts and appointments. But unlike the iPhone, which will feature large internal flash memory capacity for music and movie storage, the HTC Touch offers a microSD drive, and a 1G-byte microSD card comes with the handset."

An anonymous reader writes "IBM DeveloperWorks has a few quick tips on how to write maintainable code that won't leech your most valuable resource — time. These six tips on how to write maintainable code are guaranteed to save you time and frustration: one minute spent writing comments can save you an hour of anguish. Bad code gets written all the time. But it doesn't have to be that way. Its time to ask yourself if its time for you to convert to the clean code religion."